From 0594b833ccdf52e3f4abc422c81b8d4e20045faf Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 30 Aug 2019 18:01:01 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/10xxx/CVE-2018-10754.json | 68 +++--------------------------- 2019/1010xxx/CVE-2019-1010124.json | 5 +++ 2019/10xxx/CVE-2019-10639.json | 5 +++ 2019/13xxx/CVE-2019-13564.json | 5 +++ 2019/14xxx/CVE-2019-14378.json | 5 +++ 2019/15xxx/CVE-2019-15811.json | 5 +++ 2019/1xxx/CVE-2019-1935.json | 5 +++ 2019/1xxx/CVE-2019-1936.json | 5 +++ 2019/1xxx/CVE-2019-1937.json | 5 +++ 9 files changed, 47 insertions(+), 61 deletions(-) diff --git a/2018/10xxx/CVE-2018-10754.json b/2018/10xxx/CVE-2018-10754.json index f5ccae58cc4..ec02b25675a 100644 --- a/2018/10xxx/CVE-2018-10754.json +++ b/2018/10xxx/CVE-2018-10754.json @@ -1,71 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-10754", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-10754", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "In ncurses before 6.1.20180414, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service if the terminfo library code is used to process untrusted terminfo data in which a use-name is invalid syntax. The product proceeds to the dereference code path even after a \"dubious character `[' in name or alias field\" detection." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://drive.google.com/drive/u/2/folders/1klyBjovfKXhLqBhbWX1n9dwqD-qne5f2", - "refsource": "MISC", - "url": "https://drive.google.com/drive/u/2/folders/1klyBjovfKXhLqBhbWX1n9dwqD-qne5f2" - }, - { - "name": "https://invisible-island.net/ncurses/NEWS.html#t20180414", - "refsource": "MISC", - "url": "https://invisible-island.net/ncurses/NEWS.html#t20180414" - }, - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1566575", - "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566575" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2019/1010xxx/CVE-2019-1010124.json b/2019/1010xxx/CVE-2019-1010124.json index 31f70ad29d0..85ae8127236 100644 --- a/2019/1010xxx/CVE-2019-1010124.json +++ b/2019/1010xxx/CVE-2019-1010124.json @@ -66,6 +66,11 @@ "refsource": "MISC", "name": "https://wpvulndb.com/vulnerabilities/9856", "url": "https://wpvulndb.com/vulnerabilities/9856" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/154263/WordPress-WooCommerce-Product-Feed-2.2.18-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/154263/WordPress-WooCommerce-Product-Feed-2.2.18-Cross-Site-Scripting.html" } ] } diff --git a/2019/10xxx/CVE-2019-10639.json b/2019/10xxx/CVE-2019-10639.json index 4db3195c7b9..e8f8338d86e 100644 --- a/2019/10xxx/CVE-2019-10639.json +++ b/2019/10xxx/CVE-2019-10639.json @@ -106,6 +106,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K32804955", + "url": "https://support.f5.com/csp/article/K32804955" } ] } diff --git a/2019/13xxx/CVE-2019-13564.json b/2019/13xxx/CVE-2019-13564.json index 3809e631bc8..deffaa700bb 100644 --- a/2019/13xxx/CVE-2019-13564.json +++ b/2019/13xxx/CVE-2019-13564.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190305-01_Ping_Identity_Agentless_Integration_Kit_Reflected_XSS", "url": "https://github.com/sbaresearch/advisories/tree/public/2019/SBA-ADV-20190305-01_Ping_Identity_Agentless_Integration_Kit_Reflected_XSS" + }, + { + "refsource": "FULLDISC", + "name": "20190830 [SBA-ADV-20190305-01] CVE-2019-13564: Ping Identity Agentless Integration Kit <1.5 Reflected Cross-site Scripting (XSS)", + "url": "http://seclists.org/fulldisclosure/2019/Aug/33" } ] } diff --git a/2019/14xxx/CVE-2019-14378.json b/2019/14xxx/CVE-2019-14378.json index 8475f8167a7..4f7aaae75ad 100644 --- a/2019/14xxx/CVE-2019-14378.json +++ b/2019/14xxx/CVE-2019-14378.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "https://news.ycombinator.com/item?id=20799010", "url": "https://news.ycombinator.com/item?id=20799010" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html", + "url": "http://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html" } ] } diff --git a/2019/15xxx/CVE-2019-15811.json b/2019/15xxx/CVE-2019-15811.json index a49f7a629bf..7c4e680ccff 100644 --- a/2019/15xxx/CVE-2019-15811.json +++ b/2019/15xxx/CVE-2019-15811.json @@ -61,6 +61,11 @@ "url": "https://zerodays.lol/", "refsource": "MISC", "name": "https://zerodays.lol/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/154270/DomainMod-4.13-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/154270/DomainMod-4.13-Cross-Site-Scripting.html" } ] } diff --git a/2019/1xxx/CVE-2019-1935.json b/2019/1xxx/CVE-2019-1935.json index f1c0b7898cf..e3e3b6ea16a 100644 --- a/2019/1xxx/CVE-2019-1935.json +++ b/2019/1xxx/CVE-2019-1935.json @@ -82,6 +82,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html", "url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html" + }, + { + "refsource": "FULLDISC", + "name": "20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root", + "url": "http://seclists.org/fulldisclosure/2019/Aug/36" } ] }, diff --git a/2019/1xxx/CVE-2019-1936.json b/2019/1xxx/CVE-2019-1936.json index 2e792643e59..a204cb2fe54 100644 --- a/2019/1xxx/CVE-2019-1936.json +++ b/2019/1xxx/CVE-2019-1936.json @@ -82,6 +82,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html", "url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html" + }, + { + "refsource": "FULLDISC", + "name": "20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root", + "url": "http://seclists.org/fulldisclosure/2019/Aug/36" } ] }, diff --git a/2019/1xxx/CVE-2019-1937.json b/2019/1xxx/CVE-2019-1937.json index bee09270ab5..2903093906b 100644 --- a/2019/1xxx/CVE-2019-1937.json +++ b/2019/1xxx/CVE-2019-1937.json @@ -82,6 +82,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html", "url": "http://packetstormsecurity.com/files/154239/Cisco-UCS-IMC-Supervisor-Authentication-Bypass-Command-Injection.html" + }, + { + "refsource": "FULLDISC", + "name": "20190830 Multiple vulns in Cisco UCS Director: from unauth remote access to code execution as root", + "url": "http://seclists.org/fulldisclosure/2019/Aug/36" } ] },